| /linux/security/integrity/ima/ |
| H A D | ima_queue.c | 26 static struct tpm_digest *digests; variable 65 rc = memcmp(qe->entry->digests[ima_hash_algo_idx].digest, in ima_lookup_digest_entry() 118 key = ima_hash_key(entry->digests[ima_hash_algo_idx].digest); in ima_add_digest_entry() 170 u8 *digest = entry->digests[ima_hash_algo_idx].digest; in ima_add_template_entry() 171 struct tpm_digest *digests_arg = entry->digests; in ima_add_template_entry() 207 digests_arg = digests; in ima_add_template_entry() 272 digests = kzalloc_objs(*digests, ima_tpm_chip->nr_allocated_banks, in ima_init_digests() 274 if (!digests) in ima_init_digests() 278 digests[i].alg_id = ima_tpm_chip->allocated_banks[i].alg_id; in ima_init_digests() 286 memset(digests[i].digest, 0xff, digest_size); in ima_init_digests()
|
| H A D | ima_api.c | 31 kfree(entry->digests); in ima_free_template_entry() 43 struct tpm_digest *digests; in ima_alloc_init_template() local 56 digests = kzalloc_objs(*digests, in ima_alloc_init_template() 59 if (!digests) { in ima_alloc_init_template() 65 (*entry)->digests = digests; in ima_alloc_init_template()
|
| H A D | ima_template.c | 361 struct tpm_digest *digests; in ima_restore_template_data() local 370 digests = kzalloc_objs(*digests, in ima_restore_template_data() 373 if (!digests) { in ima_restore_template_data() 378 (*entry)->digests = digests; in ima_restore_template_data() 385 kfree((*entry)->digests); in ima_restore_template_data()
|
| H A D | ima_crypto.c | 617 rc = crypto_shash_final(shash, entry->digests[tfm_idx].digest); in ima_calc_field_array_hash_tfm() 632 entry->digests[ima_sha1_idx].alg_id = TPM_ALG_SHA1; in ima_calc_field_array_hash() 640 entry->digests[i].alg_id = alg_id; in ima_calc_field_array_hash() 645 memcpy(entry->digests[i].digest, in ima_calc_field_array_hash() 646 entry->digests[ima_sha1_idx].digest, in ima_calc_field_array_hash()
|
| H A D | ima_fs.c | 163 ima_putc(m, e->digests[algo_idx].digest, hash_digest_size[algo]); in ima_measurements_show() 255 ima_print_digest(m, e->digests[algo_idx].digest, hash_digest_size[algo]); in ima_ascii_measurements_show()
|
| H A D | ima.h | 49 /* bitset of digests algorithms allowed in the setxattr hook */ 108 struct tpm_digest *digests; member
|
| H A D | Kconfig | 72 template permits both larger hash digests and longer
|
| /linux/drivers/char/tpm/ |
| H A D | tpm-interface.c | 373 struct tpm_digest *digests) in tpm_pcr_extend() argument 386 if (digests[i].alg_id != chip->allocated_banks[i].alg_id) { in tpm_pcr_extend() 393 rc = tpm2_pcr_extend(chip, pcr_idx, digests); in tpm_pcr_extend() 397 rc = tpm1_pcr_extend(chip, pcr_idx, digests[0].digest, in tpm_pcr_extend()
|
| H A D | tpm2-cmd.c | 185 struct tpm_digest *digests) in tpm2_pcr_extend() argument 219 tpm_buf_append_u16(&buf, digests[i].alg_id); in tpm2_pcr_extend() 220 tpm_buf_append(&buf, (const unsigned char *)&digests[i].digest, in tpm2_pcr_extend()
|
| /linux/security/keys/trusted-keys/ |
| H A D | trusted_tpm1.c | 26 static struct tpm_digest *digests; variable 352 return tpm_pcr_extend(chip, pcrnum, digests) ? -EINVAL : 0; in pcrlock() 949 digests = kzalloc_objs(*digests, chip->nr_allocated_banks); in init_digests() 950 if (!digests) in init_digests() 954 digests[i].alg_id = chip->allocated_banks[i].alg_id; in init_digests() 975 kfree(digests); in trusted_tpm_init() 985 kfree(digests); in trusted_tpm_exit()
|
| /linux/net/sunrpc/ |
| H A D | Kconfig | 47 SHA-1 digests. These include aes128-cts-hmac-sha1-96 and 58 that utilize Camellia ciphers (RFC 3713) and CMAC digests 72 SHA-2 digests. These include aes128-cts-hmac-sha256-128 and
|
| /linux/Documentation/scsi/ |
| H A D | cxgb3i.rst | 33 from the host driver, computes and inserts the digests, decomposes 40 the digests, then forwarding the header to the host. The payload data,
|
| /linux/include/linux/ |
| H A D | tpm.h | 476 struct tpm_digest *digests); 503 struct tpm_digest *digests) in tpm_pcr_extend() argument
|
| /linux/Documentation/crypto/ |
| H A D | sha3.rst | 41 The following functions compute SHA-3 digests::
|
| H A D | userspace-if.rst | 115 The salg_type value "hash" applies to message digests and keyed message 116 digests. Though, a keyed message digest is referenced by the appropriate 378 - the hash cipher type (keyed message digests)
|
| /linux/Documentation/ABI/testing/ |
| H A D | ima_policy | 166 Example of a 'measure' rule requiring fs-verity's digests
|
| /linux/Documentation/admin-guide/device-mapper/ |
| H A D | verity.rst | 24 The salt is appended when hashing, digests are stored continuously and
|
| /linux/drivers/crypto/ |
| H A D | Kconfig | 201 Select this option if you want to use the phmac digests
|
| /linux/Documentation/admin-guide/LSM/ |
| H A D | ipe.rst | 689 enabled files, identified via their fsverity digests.
|